Debian Patches

Status for cracklib2/2.9.6-5

Patch Description Author Forwarded Bugs Origin Last update
install-debian-python-modules.patch install Debian specific Python modules Jan Dittberner <jandd@debian.org> no
libcrack2-error-safer-check-variant.patch add a safer check variant Markus Wanner <markus@bluegap.ch> no debian
improve_test_737040.patch improve Python test to cover low level FascistCheck Jan Dittberner <jandd@debian.org> no debian
CVE-2016-6318.patch CVE-2016-6318: Stack-based buffer overflow when parsing large GECOS field It is not safe to pass words longer than STRINGSIZE further to cracklib
so the longbuffer cannot be longer than STRINGSIZE.
Salvatore Bonaccorso <carnil@debian.org> not-needed debian vendor, https://bugzilla.redhat.com/attachment.cgi?id=1188599 2016-08-16
overflow-processing-long-words.patch The input word is guaranteed to be at most STRINGSIZE-1 in length. One of the mangle operations involves duplicating the input word, resulting in
a string twice the length to be accommodated by both area variables.

diff -rupN 3/lib/rules.c 3-patched/lib/rules.c
Howard Guo <hguo@suse.com> no debian 2016-08-17
fix-musl-linux-any-build no

All known versions for source package 'cracklib2'

Links